Keywords:-
Article Content:-
Abstract
This paper presents a robust but secured blind digital image watermarking algorithm based on two dimensional discrete wavelet transform. The algorithm is robust because instead of inserting watermark image as it is in a wavelet channel, the watermark image is compound encrypted using Arnold transform and
Logistic mapping and then inserted into the desired wavelet channel. The algorithm proposed is secured because there are many parameters that can be used as a security key e.g. the initial value of the Logistic mapping parameters and the iterative time of the Arnold transform. It is also possible to change the initially
selected parameters. The algorithm was tested using different powerful attacks like bit compression, JPEG compression, median filtering, image cropping etc. The Experimental result found supports the robustness and security of the proposed algorithm.
References:-
References
Yiwei Wang, John F. Doherty and Robert E. Van Dyck. “A wavelet-based watermarking algorithm for
ownership verification of digital images”, IEEE trans.on image processing, vol.11, no.2, Feb.2002.
A. G. Bors and I. Pitas, “Image watermarking using DCT domain constraints”, proc. of IEEE Int. conf. on
image processing, vol.3, pp 231- 234 (1996).
R. G. Van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark”, proc. of Int. conf .on Image
processing , vol.2, pp 86-90 (1994).
J. Ohnishi and K. Motsui, “Embedding a seal into a picture under orthogonal wavelet transformation”, Proc.
of Int. conf. on multimedia comp. and system, p 514-521(1996-6).
D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet based fusion”,
proc. of IEEE Int. conf. on Acoustic, speech and signal proc. vol.5, pp 544-547 Seattle, Washington (1997-5).R. Wolfgang and E. Delp, “A watermark for digital Image”, in proc. Int .conf. Image processing,vol.3, 1996,
pp 211-214.
V. R. Dahake, N. R. Dasre, V. B. Gaikwad, “Digital watermarking in frequency domain using cat mapping”,
Journal Of Science , Technology and Management, Vol-04, N0.-01, pp-11-16, (2011).
X. Y. Wang, “Chaos in the complex nonlinearity system”, Electronics Industry press, Beijing, 2003.
N. K. Pareek, P. Vinod , K. K. Sud, “Discrete Chaotic cryptography using external key”, Physics Letters
A.2003, 309(2):75-82.
X. C. Wen, C. Jing, “An anti-statistical analysis LSB stenography, incorporating extended cat mapping”,
Berlin Heidelberg, 2007, 12(5), 468-476.
G. FranQois, “Diffusion, approximation and Arnold cat map”, IEEE Transaction on Image Processing, 1996,
(4):179-190.
Xie Jianquan, Xie Qing, Haungdazu. “The periodicity and security analyze of Arnold transform”, Computer
security 2008, (5). 6-8.
Narendrakumar R. Dasre, Hemraj R. Patil “On watermarking in frequency domain”, proc. of SPIE-2010,
vol.7546, 754622, 754622-1-5.